Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2015-8852

Опубликовано: 25 апр. 2016
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 5
CVSS3: 7.5

Описание

Varnish 3.x before 3.0.7, when used in certain stacked installations, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a header line terminated by a \r (carriage return) character in conjunction with multiple Content-Length headers in an HTTP request.

РелизСтатусПримечание
devel

not-affected

esm-apps/xenial

not-affected

esm-infra-legacy/trusty

released

3.0.5-2ubuntu0.1
precise

ignored

end of life
precise/esm

DNE

precise was needs-triage
trusty

released

3.0.5-2ubuntu0.1
trusty/esm

released

3.0.5-2ubuntu0.1
upstream

released

4.0.0-1
vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

Показывать по

EPSS

Процентиль: 78%
0.0109
Низкий

5 Medium

CVSS2

7.5 High

CVSS3

Связанные уязвимости

redhat
почти 11 лет назад

Varnish 3.x before 3.0.7, when used in certain stacked installations, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a header line terminated by a \r (carriage return) character in conjunction with multiple Content-Length headers in an HTTP request.

CVSS3: 7.5
nvd
почти 10 лет назад

Varnish 3.x before 3.0.7, when used in certain stacked installations, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a header line terminated by a \r (carriage return) character in conjunction with multiple Content-Length headers in an HTTP request.

CVSS3: 7.5
debian
почти 10 лет назад

Varnish 3.x before 3.0.7, when used in certain stacked installations, ...

CVSS3: 7.5
github
больше 3 лет назад

Varnish 3.x before 3.0.7, when used in certain stacked installations, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a header line terminated by a \r (carriage return) character in conjunction with multiple Content-Length headers in an HTTP request.

EPSS

Процентиль: 78%
0.0109
Низкий

5 Medium

CVSS2

7.5 High

CVSS3